首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55299篇
  免费   9477篇
  国内免费   5928篇
电工技术   4881篇
技术理论   2篇
综合类   5115篇
化学工业   1982篇
金属工艺   1487篇
机械仪表   4307篇
建筑科学   2195篇
矿业工程   1069篇
能源动力   545篇
轻工业   4474篇
水利工程   477篇
石油天然气   1265篇
武器工业   830篇
无线电   12267篇
一般工业技术   3897篇
冶金工业   1047篇
原子能技术   541篇
自动化技术   24323篇
  2024年   614篇
  2023年   1677篇
  2022年   2706篇
  2021年   2932篇
  2020年   2889篇
  2019年   2180篇
  2018年   1860篇
  2017年   2406篇
  2016年   2502篇
  2015年   2879篇
  2014年   4353篇
  2013年   3768篇
  2012年   4673篇
  2011年   4858篇
  2010年   3663篇
  2009年   3638篇
  2008年   3684篇
  2007年   3957篇
  2006年   3182篇
  2005年   2700篇
  2004年   2037篇
  2003年   1670篇
  2002年   1273篇
  2001年   887篇
  2000年   733篇
  1999年   564篇
  1998年   489篇
  1997年   340篇
  1996年   340篇
  1995年   239篇
  1994年   172篇
  1993年   141篇
  1992年   126篇
  1991年   103篇
  1990年   93篇
  1989年   53篇
  1988年   57篇
  1987年   27篇
  1986年   34篇
  1985年   32篇
  1984年   31篇
  1983年   27篇
  1982年   20篇
  1981年   24篇
  1980年   18篇
  1979年   9篇
  1978年   9篇
  1976年   5篇
  1975年   4篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Despite the successes in the last two decades, the state-of-the-art face detectors still have problems in dealing with images in the wild due to large appearance variations. Instead of leaving appearance variations directly to statistical learning algorithms, we propose a hierarchical part based structural model to explicitly capture them. The model enables part subtype option to handle local appearance variations such as closed and open month, and part deformation to capture the global appearance variations such as pose and expression. In detection, candidate window is fitted to the structural model to infer the part location and part subtype, and detection score is then computed based on the fitted configuration. In this way, the influence of appearance variation is reduced. Besides the face model, we exploit the co-occurrence between face and body, which helps to handle large variations, such as heavy occlusions, to further boost the face detection performance. We present a phrase based representation for body detection, and propose a structural context model to jointly encode the outputs of face detector and body detector. Benefit from the rich structural face and body information, as well as the discriminative structural learning algorithm, our method achieves state-of-the-art performance on FDDB, AFW and a self-annotated dataset, under wide comparisons with commercial and academic methods.  相似文献   
72.
Behavioral cues to deception are instrumental in detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids, we propose a discourse framework and six hypotheses about deception behaviors in a multi-receiver environment. The deception behaviors are operationalized by discourse features based on an analysis of real-world data. The results of statistical analysis validate the efficacy of discourse features in discriminating deceivers from truth-tellers.  相似文献   
73.
In a large-scale locality-driven network such as in modular robotics and wireless sensor networks, knowing the state of a local area is sometimes necessary due to either interactions being local and driven by neighborhood proximity or the users being interested in the state of a certain region. We define locality-aware predicates (LAP) that aim at detecting a predicate within a specified area. We model the area of interest as the set of processes that are within a breadth-first search tree (BFST) of height kk rooted at the initiator process. Although a locality-aware predicate specifies a predicate only within a local area, observing the area consistently requires considering the entire system in a consistent manner. This raises the challenge of making the complexities of the corresponding predicate detection algorithms scale-free, i.e., independent of the size of the system. Since all existing algorithms for getting a consistent view of the system require either a global snapshot of the entire system or vector clocks of the size of the system, a new solution is needed. We focus on stable LAP, which are those LAP that remain true once they become true. We propose a scale-free algorithm to detect stable LAP within a kk-height BFST. Our algorithm can detect both stable conjunctive LAP and stable relational LAP. In the process of designing our algorithm, we also propose the first distributed algorithm for building a BFST within an area of interest in a graph, and the first distributed algorithm for recording a consistent sub-cut within the area of interest. This paper demonstrates that LAPs are a natural fit for detecting distributed properties in large-scale distributed systems, and stable LAPs can be practically detected at low cost.  相似文献   
74.
75.
In this paper, we describe several approaches to language-independent spoken term detection and compare their performance on a common task, namely “Spoken Web Search”. The goal of this part of the MediaEval initiative is to perform low-resource language-independent audio search using audio as input. The data was taken from “spoken web” material collected over mobile phone connections by IBM India as well as from the LWAZI corpus of African languages. As part of the 2011 and 2012 MediaEval benchmark campaigns, a number of diverse systems were implemented by independent teams, and submitted to the “Spoken Web Search” task. This paper presents the 2011 and 2012 results, and compares the relative merits and weaknesses of approaches developed by participants, providing analysis and directions for future research, in order to improve voice access to spoken information in low resource settings.  相似文献   
76.
77.
The promising potential of cloud computing and its convergence with technologies such as mobile computing, wireless networks, sensor technologies allows for creation and delivery of newer type of cloud services. In this paper, we advocate the use of cloud computing for the creation and management of cloud based health care services. As a representative case study, we design a Cloud Based Intelligent Health Care Service (CBIHCS) that performs real time monitoring of user health data for diagnosis of chronic illness such as diabetes. Advance body sensor components are utilized to gather user specific health data and store in cloud based storage repositories for subsequent analysis and classification. In addition, infrastructure level mechanisms are proposed to provide dynamic resource elasticity for CBIHCS. Experimental results demonstrate that classification accuracy of 92.59% is achieved with our prototype system and the predicted patterns of CPU usage offer better opportunities for adaptive resource elasticity.  相似文献   
78.
A fall detection method based on depth image analysis is proposed in this paper. As different from the conventional methods, if the pedestrians are partially overlapped or partially occluded, the proposed method is still able to detect fall events and has the following advantages: (1) single or multiple pedestrian detection; (2) recognition of human and non-human objects; (3) compensation for illumination, which is applicable in scenarios using indoor light sources of different colors; (4) using the central line of a human silhouette to obtain the pedestrian tilt angle; and (5) avoiding misrecognition of a squat or stoop as a fall. According to the experimental results, the precision of the proposed fall detection method is 94.31% and the recall is 85.57%. The proposed method is verified to be robust and specifically suitable for applying in family homes, corridors and other public places.  相似文献   
79.
This paper addresses the problem of determining the symmetries of a plane or space curve defined by a rational parametrization. We provide effective methods to compute the involution and rotation symmetries for the planar case. As for space curves, our method finds the involutions in all cases, and all the rotation symmetries in the particular case of Pythagorean-hodograph curves. Our algorithms solve these problems without converting to implicit form. Instead, we make use of a relationship between two proper parametrizations of the same curve, which leads to algorithms that involve only univariate polynomials. These algorithms have been implemented and tested in the Sage system.  相似文献   
80.
The study of criminal networks using traces from heterogeneous communication media is acquiring increasing importance in nowadays society. The usage of communication media such as mobile phones and online social networks leaves digital traces in the form of metadata that can be used for this type of analysis. The goal of this work is twofold: first we provide a theoretical framework for the problem of detecting and characterizing criminal organizations in networks reconstructed from phone call records. Then, we introduce an expert system to support law enforcement agencies in the task of unveiling the underlying structure of criminal networks hidden in communication data. This platform allows for statistical network analysis, community detection and visual exploration of mobile phone network data. It enables forensic investigators to deeply understand hierarchies within criminal organizations, discovering members who play central role and provide connection among sub-groups. Our work concludes illustrating the adoption of our computational framework for a real-word criminal investigation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号